top of page
Search

Announcing new EDR capabilities for Webroot Endpoint Protection



EDR capabilities for Webroot Endpoint Protection
Introducing key EDR functionality

Introducing key EDR functionality


In today’s rapidly evolving cyber landscape, staying ahead of threats requires not just robust defenses, but also smart, efficient tools that empower defenders without overburdening them. Webroot™ by OpenText™ recognizes the vital role that endpoint detection and response (EDR) capabilities play in a comprehensive cybersecurity strategy. As we continue our EDR journey, we’re excited to announce critical capabilities tailored to the understaffed, overworked, and overstressed human SMB defender.


And guess what? These capabilities are included at no extra cost to all Webroot Endpoint Protection customers!


Empowering human defenders


Webroot is committed to providing the essential tools that significantly bolster your cybersecurity posture. These tools are designed to protect and empower defenders with actionable insights and flexible response options. By continuously innovating and refining our offerings, we ensure that you are equipped with the essential capabilities to protect your environment.

Our new features include:


  • Device Isolation: In the event of a threat, it’s crucial to prevent its spread across the network. Our Device Isolation feature allows you to swiftly isolate affected devices, halting the advance of malware while preserving essential communications. This capability is key to rapid threat containment and investigation, safeguarding your network’s integrity.



Webroot EDR - Device Isolation
Safeguarding your network’s integrity

  • Process Tree Visualization: Understanding the ‘how’ and ‘where’ of a threat is pivotal for effective cybersecurity. With Process Tree Visualization, defenders gain insights into device-level processes, enabling you to trace the origins and pathways of processes, providing a clear view of potential threats.


Webroot EDR - Process Tree Visualisation
The Process Tree

Why these features matter


These lightweight, yet powerful enhancements to your security toolkit are essential components that have the potential to aid in fulfilling cyber-insurance requirements. These new capabilities represent Webroot’s commitment to delivering solutions that protect without imposing unnecessary complexity or slowing down your operations. Focusing on Device Isolation and Process Tree Visualization as our initial EDR features was a deliberate choice. These capabilities are:


  • Impactful: They provide meaningful security enhancements that directly contribute to defending against and mitigating cyber threats.

  • Accessible: Designed with SMB network defenders in mind, they ensure that adopting and leveraging advanced security features doesn’t require extensive training or resources.

  • Relevant: These features can help support core requirements of cyber-insurance applications, making them not just valuable for security but also for compliance and financial protection.


A commitment to continuous improvement


Webroot are committed to enhancing their offerings and moving towards comprehensive EDR functionality. As they continue to build out their security solutions, these features mark important milestones in their journey to empower SMBs with the tools they need to defend against the ever-changing cyber threat landscape. Stay tuned for these updates and join Webroot and CyberHub in strengthening your cybersecurity defenses with Webroot’s innovative solutions. Together, we can ensure that your organization remains resilient in the face of cyberthreats, today and into the future.


Author: David Rote Sr. Product Marketing Specialist

Comments


bottom of page